Information security applications [electronic resource] : 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013 : revised selected papers / Yongdae Kim, Heejo Lee, Adrian Perrig (eds.).
2014
QA76.9.A25
Formats
| Format | |
|---|---|
| BibTeX | |
| MARCXML | |
| TextMARC | |
| MARC | |
| DublinCore | |
| EndNote | |
| NLM | |
| RefWorks | |
| RIS |
Cite
Citation
Linked e-resources
Linked Resource
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Information security applications [electronic resource] : 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013 : revised selected papers / Yongdae Kim, Heejo Lee, Adrian Perrig (eds.).
ISBN
9783319051499 (ebook)
3319051490 (ebook)
9783319051482
3319051482
3319051490 (ebook)
9783319051482
3319051482
Published
Heidelberg : Springer, 2014.
Language
English
Description
1 online resource : illustrations.
Item Number
10.1007/978-3-319-05149-9 doi
Call Number
QA76.9.A25
Dewey Decimal Classification
005.8
Summary
This book constitutes the thoroughly refereed proceedings of the 14th International Workshop on Information Security Applications, WISA 2013, held on Jeju Island, Korea, in August 2013. The 15 revised full papers and 2 short papers presented were carefully reviewed and selected from 39 submissions. The papers are organized in topical sections such as cryptography, social network security, mobile security, network security, future applications and privacy.
Bibliography, etc. Note
Includes bibliographical references and index.
Access Note
Access limited to authorized users.
Added Author
Series
Lecture notes in computer science ; 8267. 1611-3349
LNCS sublibrary. SL 4, Security and cryptology.
LNCS sublibrary. SL 4, Security and cryptology.
Available in Other Form
Printed edition: 9783319051482
Linked Resources
Record Appears in
Table of Contents
Cryptography
Social network security
Mobile security
Network security
Future applications
Privacy.
Social network security
Mobile security
Network security
Future applications
Privacy.